1
کامپیوتر و شبکه::
توپولوژی شبکه، همبندی شبکه
The network topology and the traffic forecast are used to assist in select- ing the grooming sites.
Grooming algorithms have evolved in concert with the network topology and the network traffic.
The results of any grooming exercise heavily depend on the traffic distribution among nodes, the network topology, and the network line rate.
The grooming study was repeated for the same network topology and traffic, but where only 15 of the 60 nodes were equipped with grooming switches.،The only information considered about an unattributed network is the network topology or the fact that the interaction has occurred.
Hence, the anomaly detection task in static networks is to uncover anomalous units such as nodes, edges, or subgraphs given the entire network topology.
Anomalies in static attributed networks are determined by analyzing the network topology as well as the attributes asso- ciated with nodes and/or edges.
The node in- formation is formulated as a mixture of Gaussian distributions or multinomial distributions, whereas the network topology in- formation is encoded as spatial constraints on the hidden variables via the HMRF model.
The algorithm that detects LEOutliers consists of two stages: (1) discovering Corenets based on the network topology and edge weights, and (2) measuring outlier score by inspecting and comparing Corenets at different snapshots.
واژگان شبکه مترجمین ایران